Abstract
Wireless medical sensor networks (WMSNs) realize remote monitoring of patients’ health status through the combination of medical sensors and wireless communication. There is an urgent need to ensure the integrity, authenticity, authentication, and privacy of patients’ medical data and improve treatment outcomes. Currently, many aggregate signature schemes have been developed to protect patients’ medical data in WMSNs. Among them, the pairing operation and key exposure in some aggregate signature schemes can raise efficiency and security issues in medical data transmission, and some of them do not achieve equivalent security, which leads to healthcare professionals receiving inaccurate medical data. Aiming at these, this paper proposes a pairing-free certificate-based key-insulated aggregate signature scheme (CB-KIAS) in WMSNs, which introduces key-insulated technique that can effectively avoid the problem of key exposure. According to formal security proof, this scheme is unforgeable against adaptive-chosen message attacks and having the equivalent security of aggregate signature to ensure that the validity of the aggregate signature is equal to the validities of all single signatures to resist fully chosen-key attacks. The proposed CB-KIAS scheme, utilizing elliptic curves and the combination of online/offline cryptography mechanism, is effective and more suitable for resource-constrained medical sensors when compared with other related schemes.






Similar content being viewed by others
Data availability
Not applicable.
References
Wang Z, Xiong H, Zhang J, Yang S, Boukhechba M, Zhang D, Barnes LE, Dou D (2022) From personalized medicine to population health: a survey of mhealth sensing techniques. IEEE Internet Things J 9(17):15413–15434
Al-Turjman F, Nawaz MH, Ulusar UD (2020) Intelligence in the internet of medical things era: A systematic review of current and future trends. Comput Commun 150:644–660
Institute CRIR (2023) 2023–2029 China medical sensor market in-depth survey and industry outlook forecast report. Co-Research Industrial Research Institute
Masud M, Gaba GS, Alqahtani S, Muhammad G, Gupta BB, Kumar P, Ghoneim A (2020) A lightweight and robust secure key establishment protocol for internet of medical things in COVID-19 patients care. IEEE Internet Things J 8(21):15694–15703
Al Ameen M, Liu J, Kwak K (2012) Security and privacy issues in wireless sensor networks for healthcare applications. J Med Syst 36(1):93–101
Subramani J, Maria A, Rajasekaran AS, Al-Turjman F (2021) Lightweight privacy and confidentiality preserving anonymous authentication scheme for WBANS. IEEE Trans Ind Informatics 18(5):3484–3491
Diffie W, Hellman ME (1976) New directions in cryptography. IEEE Trans Inf Theory 22(6):644–654
Shen L, Ma J, Liu X, Miao M (2016) A provably secure aggregate signature scheme for healthcare wireless sensor networks. J Medical Syst 40(11):1–10
Shamir A (1984) Identity-based cryptosystems and signature schemes. In: Blakley GR, Chaum D (eds) Advances in Cryptology, Proceedings of CRYPTO ’84, Santa Barbara, California, USA, August 19-22, 1984, Proceedings, Lecture Notes in Computer Science, vol 196. Springer, pp 47–53
Xie C, Weng J, Weng J, Hou L (2020) Scalable revocable identity-based signature over lattices in the standard model. Inf Sci 518:29–38
Al-Riyami SS, Paterson KG (2003) Certificateless public key cryptography. In: International conference on the theory and application of cryptology and information security. Springer, pp 452–473
Xiong H, Mei Q, Zhao Y (2019) Efficient and provably secure certificateless parallel key-insulated signature without pairing for iiot environments. IEEE Syst J 14(1):310–320
Liu J, Wang L, Yu Y (2020) Improved security of a pairing-free certificateless aggregate signature in healthcare wireless medical sensor networks. IEEE Internet Things J 7(6):5256–5266
Gentry C (2003) Certificate-based encryption and the certificate revocation problem. In: International Conference on the Theory and Applications of Cryptographic Techniques. Springer, pp 272–293
Kang BG, Park JH, Hahn SG (2004) A certificate-based signature scheme. In: Cryptographers’ Track at the RSA Conference. Springer, pp 99–111
Li J, Huang X, Mu Y, Susilo W, Wu Q (2007) Certificate-based signature: security model and efficient construction. In: European Public Key Infrastructure Workshop, Springer, pp 110–125
Wu W, Mu Y, Susilo W, Huang X (2009) Certificate-based signatures revisited. J Univers Comput Sci 15(8):1659–1684
Li J, Huang X, Zhang Y, Xu L (2012) An efficient short certificate-based signature scheme. J Syst Softw 85(2):314–322
Gao W, Wang G, Chen K, Wang X (2017) Generic construction of certificate-based signature from certificateless signature with provable security. Informatica 28(2):215–235
Liu JK, Baek J, Zhou J (2009) Certificate-based sequential aggregate signature. In: Proceedings of the second ACM conference on Wireless network security, pp 21–28
Ma X, Shao J, Zuo C, Meng R (2017) Efficient certificate-based signature and its aggregation. In: International Conference on Information Security Practice and Experience. Springer, pp 391–408
Verma GK, Singh B, Kumar N, Kaiwartya O, Obaidat MS (2019) PFCBAS: Pairing free and provable certificate-based aggregate signature scheme for the e-healthcare monitoring system. IEEE Syst J 14(2):1704–1715
Verma GK, Singh B, Kumar N, Chamola V (2019) CB-CAS: Certificate-based efficient signature scheme with compact aggregation for industrial internet of things environment. IEEE Internet Things J 7(4):2563–2572
Verma GK, Kumar N, Gope P, Singh B, Singh H (2021) SCBS: a short certificate-based signature scheme with efficient aggregation for industrial-internet-of-things environment. IEEE Internet Things J 8(11):9305–9316
Zhu F, Yi X, Abuadbba A, Khalil I, Nepal S, Huang X, Yan X (2022) Certificate-based anonymous authentication with efficient aggregation for wireless medical sensor networks. IEEE Internet Things J 9(14):12209–12218
Yao ACC, Zhao Y (2012) Online/offline signatures for low-power devices. IEEE Trans Inf Forensics Secur 8(2):283–294
Khan MA, Rehman SU, Uddin MI, Nisar S, Noor F, Alzahrani A, Ullah I et al (2020) An online-offline certificateless signature scheme for internet of health things. J Healthc Eng 2020
Liao Y, Liu Y, Liang Y, Wu Y, Nie X (2019) Revisit of certificateless signature scheme used to remote authentication schemes for wireless body area networks. IEEE Internet Things J 7(3):2160–2168
Peng C, Luo M, Li L, Choo KKR, He D (2021) Efficient certificateless online/offline signature scheme for wireless body area networks. IEEE Internet Things J 8(18):14287–14298
Chen X, Zhang F, Susilo W, Mu Y (2007) Efficient generic on-line/off-line signatures without key exposure. In: Applied Cryptography and Network Security: 5th International Conference, ACNS 2007, Zhuhai, China, June 5–8, 2007. Proceedings 5. Springer, pp 18–30
Dodis Y, Katz J, Xu S, Yung M (2002) Key-insulated public key cryptosystems. In: International conference on the theory and applications of cryptographic techniques. Springer, pp 65–82
Dodis Y, Katz J, Xu S, Yung M (2002) Strong key-insulated signature schemes. In: Public Key Cryptography—PKC 2003: 6th International Workshop on Practice and Theory in Public Key Cryptography Miami, FL, USA, January 6–8, 2003 Proceedings 6. Springer, pp 130–144
Xiong H, Wu S, Geng J, Ahene E, Wu S, Qin Z (2015) A pairing-free key-insulated certificate-based signature scheme with provable security. KSII Trans Internet Inf Syst 9(3):1246–1259
Hwang YW, Lee Y (2021) A lightweight certificate-based aggregate signature scheme providing key insulation. Computers, Materials & Continua 69(2):1
Hou Y, Xiong H, Huang X, Kumari S (2021) Certificate-based parallel key-insulated aggregate signature against fully chosen key attacks for industrial internet of things. IEEE Internet Things J 8(11):8935–8948
Boneh D, Gentry C, Lynn B, Shacham H (2003) Aggregate and verifiably encrypted signatures from bilinear maps. In: International conference on the theory and applications of cryptographic techniques. Springer, pp 416–432
Wu G, Zhang F, Shen L, Guo F, Susilo W (2020) Certificateless aggregate signature scheme secure against fully chosen-key attacks. Inf Sci 514:288–301
Gayathri NB, Gowri T, Kumar PR, Rahman MZU, Reddy PV, Lay-Ekuakille A (2019) Efficient and secure pairing-free certificateless aggregate signature scheme for healthcare wireless medical sensor networks. IEEE Internet Things J 6(5):9064–9075
Funding
This study was supported by the Open Fund of Advanced Cryptography and System Security Key Laboratory of Sichuan Province (Grant No. SKLACSS-202311), the National Natural Science Foundation of China (U1936213, 62372285), and Shanghai Rising-Star Program (22QA1403800).
Author information
Authors and Affiliations
Contributions
Min Liu wrote the main manuscript text. Liangliang Wang, Kai Zhang, Yu Long, Baodong Qin assisted in the analysis and conducted constructive discussions. All authors reviewed the manuscript.
Corresponding author
Ethics declarations
Ethics approval
This paper does not contain any studies with human participants or animals performed by any of the authors.
Consent to publish
This manuscript is approved by all authors for publication.
Competing interests
The authors declare no competing interests.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article is part of the Topical Collection: Special Issue on 2 - Track on Security and Privacy
Guest Editor: Rongxing Lu
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Liu, M., Wang, L., Zhang, K. et al. A pairing-free certificate-based key-insulated aggregate signature scheme for wireless medical sensor networks. Peer-to-Peer Netw. Appl. 17, 685–700 (2024). https://doi.org/10.1007/s12083-023-01610-w
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-023-01610-w